Analysis
-
max time kernel
100s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
b44ba8f64f3b31d131233b7877707d00N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b44ba8f64f3b31d131233b7877707d00N.exe
Resource
win10v2004-20240802-en
General
-
Target
b44ba8f64f3b31d131233b7877707d00N.exe
-
Size
1.2MB
-
MD5
b44ba8f64f3b31d131233b7877707d00
-
SHA1
8c1ccbd09ff718016f782a036236c1bdfe9f0eed
-
SHA256
9b12f06251853db6f89260a470968f45d5566d914985a82c9664aa7025f8840b
-
SHA512
ad8b868c0c98ef720d801a79f0d67a06c7dd94a35610b4592829eec4731f4ed883d981e85e5255190d35045ca78abb1beeefde60f9c327d6e571d107350ff8ff
-
SSDEEP
24576:TaxBRhP/+nx6UFObcpg8VTSYLZmN1DUZmSordfq6Ph2kkkkK4kXkkkkkkkkA:TaxByLa8V/ZmXYZmSadfqX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1712 B352.tmp -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B352.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b44ba8f64f3b31d131233b7877707d00N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4368 wrote to memory of 1712 4368 b44ba8f64f3b31d131233b7877707d00N.exe 84 PID 4368 wrote to memory of 1712 4368 b44ba8f64f3b31d131233b7877707d00N.exe 84 PID 4368 wrote to memory of 1712 4368 b44ba8f64f3b31d131233b7877707d00N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\b44ba8f64f3b31d131233b7877707d00N.exe"C:\Users\Admin\AppData\Local\Temp\b44ba8f64f3b31d131233b7877707d00N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\B352.tmp"C:\Users\Admin\AppData\Local\Temp\B352.tmp"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD529e68896693a6398260b8764abc1274e
SHA1834b2b2c90004b34412fa36e2baf84fc78f1dece
SHA256fa916f8176c3a71d937737f02e9cd283faf561fa65b39116ed6360c778940da4
SHA512e51b064825e5f943dd74fd2772fcfbd9ed4b6d9fa6e73ce33c54b09ce730039b99b058748ee85b87b3c5c7a18191e98723339481dab4d014785a6b1efd9c32db